Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Hong Kong

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 168.106.39.100
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30318
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;168.106.39.100.			IN	A

;; AUTHORITY SECTION:
.			586	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020081300 1800 900 604800 86400

;; Query time: 23 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Aug 13 17:09:39 CST 2020
;; MSG SIZE  rcvd: 118
Host info
Host 100.39.106.168.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 100.39.106.168.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
222.186.15.110 attack
Jul  7 17:32:45 vps691689 sshd[22650]: Failed password for root from 222.186.15.110 port 39201 ssh2
Jul  7 17:32:55 vps691689 sshd[22652]: Failed password for root from 222.186.15.110 port 44558 ssh2
...
2019-07-07 23:35:11
36.65.151.221 attack
Unauthorised access (Jul  7) SRC=36.65.151.221 LEN=52 TTL=248 ID=9394 DF TCP DPT=445 WINDOW=8192 SYN
2019-07-07 23:44:36
122.116.86.54 attack
3389BruteforceFW23
2019-07-07 23:25:09
74.63.232.2 attackspambots
2019-07-07T15:15:09.040335abusebot-2.cloudsearch.cf sshd\[10124\]: Invalid user guest5 from 74.63.232.2 port 33068
2019-07-07 23:34:46
81.30.208.114 attackspam
Jul  7 17:15:38 localhost sshd\[20105\]: Invalid user admin from 81.30.208.114 port 34330
Jul  7 17:15:38 localhost sshd\[20105\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.30.208.114
Jul  7 17:15:40 localhost sshd\[20105\]: Failed password for invalid user admin from 81.30.208.114 port 34330 ssh2
2019-07-07 23:47:50
45.55.254.13 attackbotsspam
Jul  7 17:38:54 legacy sshd[31951]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.254.13
Jul  7 17:38:56 legacy sshd[31951]: Failed password for invalid user tomcat from 45.55.254.13 port 53734 ssh2
Jul  7 17:40:58 legacy sshd[31985]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.254.13
...
2019-07-08 00:06:15
45.122.222.253 attack
Jul  7 17:43:18 server sshd[17875]: Failed password for root from 45.122.222.253 port 52308 ssh2
...
2019-07-08 00:08:40
61.72.254.71 attackspam
SSH Brute Force, server-1 sshd[28640]: Failed password for invalid user zewa from 61.72.254.71 port 50910 ssh2
2019-07-08 00:08:04
3.87.179.109 attack
Jul  7 13:43:16   TCP Attack: SRC=3.87.179.109 DST=[Masked] LEN=250 TOS=0x00 PREC=0x00 TTL=234  DF PROTO=TCP SPT=60916 DPT=80 WINDOW=913 RES=0x00 ACK PSH URGP=0
2019-07-07 23:50:55
188.166.0.4 attack
Caught in portsentry honeypot
2019-07-07 23:35:38
60.28.131.10 attack
Brute force attempt
2019-07-07 23:25:42
190.122.128.152 attackbotsspam
Bruteforce on smtp
2019-07-07 23:21:59
85.144.226.170 attackspambots
Jul  7 17:05:28 minden010 sshd[15585]: Failed password for root from 85.144.226.170 port 54356 ssh2
Jul  7 17:06:28 minden010 sshd[15930]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.144.226.170
Jul  7 17:06:30 minden010 sshd[15930]: Failed password for invalid user shop1 from 85.144.226.170 port 36072 ssh2
...
2019-07-07 23:54:57
198.12.68.217 attack
SMB Server BruteForce Attack
2019-07-07 23:41:36
122.112.205.18 attackspambots
Jul  7 07:41:52 localhost kernel: [13743905.944198] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=122.112.205.18 DST=[mungedIP2] LEN=44 TOS=0x00 PREC=0x00 TTL=94 ID=256 PROTO=TCP SPT=6000 DPT=1433 WINDOW=16384 RES=0x00 SYN URGP=0 
Jul  7 07:41:52 localhost kernel: [13743905.944233] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=122.112.205.18 DST=[mungedIP2] LEN=44 TOS=0x00 PREC=0x00 TTL=94 ID=256 PROTO=TCP SPT=6000 DPT=1433 SEQ=1672937472 ACK=0 WINDOW=16384 RES=0x00 SYN URGP=0 OPT (020405B4) 
Jul  7 09:45:16 localhost kernel: [13751310.223336] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=122.112.205.18 DST=[mungedIP2] LEN=44 TOS=0x00 PREC=0x00 TTL=94 ID=256 PROTO=TCP SPT=6000 DPT=1433 WINDOW=16384 RES=0x00 SYN URGP=0 
Jul  7 09:45:16 localhost kernel: [13751310.223358] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=122.112.205.18 DST=[mungedIP2] LEN=44
2019-07-07 23:11:36

Recently Reported IPs

105.132.131.3 113.162.5.241 226.37.1.23 160.13.160.193
106.225.162.49 45.136.7.167 201.55.142.31 59.126.40.128
144.134.192.107 117.8.108.165 103.237.56.109 183.130.90.79
104.106.255.152 247.130.104.250 113.188.38.66 202.95.151.13
137.38.59.55 67.190.13.230 177.91.182.170 113.89.41.53